cs.ucsb.edu
Networking Conferences Statistics
http://www.cs.ucsb.edu/~almeroth/conf/stats
This page is an attempt to gather year-over-year statistics for some of the major systems and networking conferences. For an analysis of this data see Utkarsh Goel, Clemente Izurieta, Mike P. Wittie. "Understanding Factors Influencing the Citation Count of Networking Conference Papers" in ISCA Software Engineering and Data Engineering (SEDE), October 2015. For Architecture conference stats (ISCA, Micro, HPCA, ASPLOS), see the Prichard, Scopel, Hill, Sohi, and Wood Excel File. URL of the Conference. 21 ( ...
saweis.net
Stephen A. Weis - Cryptographer and Security Software Engineer
http://saweis.net/hbplus.html
Stephen A. Weis. Cryptography and Information Security. HB is a secure authentication protocol that is extremeley simple to implement in hardware. Its low implementation cost could make HB useful in preventing "skimming", counterfeiting, or cloning of cheap pervasive devices like RFID tags. HB was developed with Ari Juels. Of RSA Security and was presented at Crypto'05. HB builds on a protocol for human-to-computer authentication originally developed by Nick Hopper. Here are presentation slides. Katz and...
acns08.cs.columbia.edu
Applied Cryptography and Network Security (ACNS) 2008
http://acns08.cs.columbia.edu/gotocolumbia.html
Applied Cryptography and Network Security 2008. Traveling to Columbia and New York City. Newark Liberty International Airport: EWR. John F. Kennedy International Airport: JFK. The maps are useful for showing the general layout of New York and the location of Columbia University relative to each of the three major area airports. Columbia has an interactive map of the campus. Here is a Google Map. Of the area of Manhattan around Columbia University. Showing a car route from Newark Airport to Columbia.
acns08.cs.columbia.edu
Applied Cryptography and Network Security (ACNS) 2008
http://acns08.cs.columbia.edu/accepted_papers.html
Applied Cryptography and Network Security 2008. ACNS 2008 Accepted Papers. An authentication scheme based on the twisted conjugacy problem. Vladimir Shpilrain and Alexander Ushakov. The City College of New York and Stevens Institute of Technology. Attacking Reduced Round SHA-256. Somitra Kumar Sanadhya and Palash Sarkar. Indian Statistical Institute, Kolkata, India. Generic Constructions of Stateful Public Key Encryption and Their Applications. Joonsang Baek and Jianying Zhou and Feng Bao. Generic Securi...